Google, the energy saver! Energy efficiency of Google products
n a wired finding by a Harvard researcher, Google search generates 7 grams of carbon dioxide (CO2), slightly less than half as much CO2 as boiling a kettle for a
n a wired finding by a Harvard researcher, Google search generates 7 grams of carbon dioxide (CO2), slightly less than half as much CO2 as boiling a kettle for a
A simple hack that allow you to edit read only Google docs is explained here http://googlesystem.blogspot.com/2009/01/copy-google-documents-to-your-account.html It works and all you need is to hack the url a bit like
With the increasing number of wi-fi home or small office networks mushrooming all over the place, the hackers are having a field day. The hackers break-in at will and carry
Russian hacker has sent a note to the windows defender team. It’s discovered by a French analyst while analyzing the variant of the Zlob Trojan. The original note below. “For
Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian
Windows genuine advantage notifications occur when your computer hasn’t passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or
Credit go to sam207 TABLE OF CONTENT: #INTRO #WHAT IS DATABASE? #WHAT IS SQL INJECTION? #BYPASSING LOGINS #ACCESSING SECRET DATA #Checking for vulnerability #Find the number of columns #Addressing vulnerable